IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen

Size: px
Start display at page:

Download "IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen"

Transcription

1 IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen 1

2 Ga between APP and Network APP wants A connection between two sites APP doesn t want Configurations of each device between two sites A service flow with SLA Flow entries in each device Tunnel, ACL, PBR configurations of different devices A customer network service chain 2

3 NEMO language for intent based network modeling NEMO APP Object Model Behavior Model NEMO Engine Node Connection Flow Oeration SDN Controller 15 simle statement for hundreds of comlex APIs Network alication/user use NEMO Language to rogramming their service NEMO Language is an Intent oriented network DSL (domain secific language), which is a language style network oen interface. Oerator/End-user or 3rd arty can use it to rogram network resource and behavior in their service alications. NEMO Engine is a network middleware, which translate high level service intent to real network instruction base on MDA(Model Driven Architecture). NEMO is now an OenDaylight roject coming with Beryllium release. htts://wiki.oendaylight.org/view/nemo:main 3

4 Use case : Virtual Private Cloud Oerator rovide virtual rivate cloud service for enterrises. Need to allocate two zones in the VPC for security issue. DMZ rovide htt/ /video services for access from internet. Interior rovide comute and storage resources for existing enterrise site. Provide BoD caability on the WAN connection. E.g, increase bandwidth when cloud bursting or backu internet BoD DMZ Enterrise site WAN interior Virtual Private Cloud 4

5 Use case: End to End Carrier Network The enterrise outsources their CPE business to the service rovider. The Branch site alies chained services in the vcpe before accessing WAN. The enterrise requests BoD in WAN between the branch and the headquarter for different bandwidth requirements, e.g., day/work and night/backu. The NEMO rogrammed logic runs on the Suer controller and instruct domain controller to accomlish network service rovisioning and olicy alying. Suer controller Domain controller Acc Core Domain controller Branch vcpe WAN Headquarter FW Cache BoD 5

6 An Examle: Bandwidth on Demand (B2B) DOCSIS There is a virtual link between the branch and headquarter offices. o The bandwidth of the vlink can be adjusted on demand o The adjustment can be triggered by "conditions" meet, e.g. The bandwidth will be adjusted when the timing meets. NEMO Scrit: Node branch; Node HQ; Connection tunnel Tye P2P Endnodes branch, HQ; Branch WAN Headquarter Condition: from 8am to 6m, Bandwidth: 10G Condition: from 6m to 8am, Bandwidth: 1G Constraint day AlyTo tunnel Condition time>8am & time <6m Oeration set:bandwidth=10g; Constraint night AlyTo tunnel Condition(time>0am & time<8am) (time>6m & time<0am) Oeration set:bandwidth=1g; 6

7 NEMO Editor in Eclise Program a Eclise lug-in that highlights the keywords Integrate with the IBNEMO roject Parse the NEMO language and comose the NEMO rest API. Call rest client/lib to send the request. Reference: Hackathon imlementation result: htts://github.com/aaguti-work/nemo-ietf 7

8 What could be the role of intent-based networking in situation where the system's goal "emerges" from the agents interactions? IBNEMO can dynamically udate the network behaviour. So if IBNEMO a gets alert that change is needed, it can do so Tianran Zhou can demo (see him. Possibly also demo at Bits&Bytes) Question: should IBNEMO also monitor network? Should that be art of IBNEMO? Can it rely on other network monitoring tools that trigger IBNEMO activity? Are there researchers that want to exeriment with that? Do we have ideas on how to do this? 8

9 What we are looking for: do you have exerience in oerating a network? How would you imlement the use cases? Feedback on the NEMO language definition, roosals for enhancements the OenDaylight roject? Hel us debug the current OenDaylight NEMO Engine rogramming lugins for Eclise? Program the interface(s) to drive the OenDaylight imlementation Integrate them with the NEMO Editor You know Xtext? Hel us to imrove the NEMO Editor lugin 9

10 Thank You 10

Note Well. All IETF Contributions are subject to the rules of RFC 5378 and RFC 3979 (updated by RFC 4879).

Note Well. All IETF Contributions are subject to the rules of RFC 5378 and RFC 3979 (updated by RFC 4879). Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made within the context of an IETF activity is considered

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012 FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012

More information

Intent NBI for Software Defined Networking

Intent NBI for Software Defined Networking Intent NBI for Software Defined Networking 1 SDN NBI Challenges According to the architecture definition in Open Networking Foundation (ONF), a Software Defined Network (SDN) includes three vertically

More information

SDN/OpenFlow. Outline. Performance U!, Winterschool, Zurich. www.openflow.org. SDN to OpenFlow. OpenFlow a valid technology!

SDN/OpenFlow. Outline. Performance U!, Winterschool, Zurich. www.openflow.org. SDN to OpenFlow. OpenFlow a valid technology! SDN/OenFlow Performance U!, Winterschool, Zurich www.oenflow.org Kurt Baumann kurt.baumann@switch.ch Zurich, 08. March 2013 Outline SDN to OenFlow OenFlow a valid technology! Basic Concet How it works

More information

Sage Document Management. User's Guide Version 13.1

Sage Document Management. User's Guide Version 13.1 Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

Sage Document Management. User's Guide Version 12.1

Sage Document Management. User's Guide Version 12.1 Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4 Table of Contents Bravo Software Grou e.commerce enablers... 2 RemoteDesk... 4 A suite of roducts for entering orders or invoices remotely, for direct osting to your central accounting system. RemoteDesk

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

Extending your Qt Android application using JNI

Extending your Qt Android application using JNI Extending your Qt Android alication using JNI Dev Days, 2014 Presented by BogDan Vatra Material based on Qt 5.3, created on November 13, 2014 Extending your alication using JNI Extending your alication

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES

HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES Brian Levy CTO SERVICE PROVIDER SECTOR EMEA JUNIPER NETWORKS CIO DILEMA IT viewed as cost center

More information

ShareFile Enterprise: Security Whitepaper

ShareFile Enterprise: Security Whitepaper ShareFile Enterrise: 2 Table of contents Introduction 4 SaaS alication tier 5 ShareFiles servers: Web, API, and database overview 5 SaaS alication tier security 6 Encrytion 6 Hash-based message authentication

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

Citrix NetScaler and Citrix XenDesktop 7 Deployment Guide

Citrix NetScaler and Citrix XenDesktop 7 Deployment Guide Citrix NetScaler and Citrix XenDeskto 7 Deloyment Guide 2 Table of contents Executive summary and document overview 3 1. Introduction 3 1.1 Overview summary 3 2. Architectural overview 4 2.1 Physical view

More information

Agile VPN for Carrier/SP Network. ONOS- based SDN Controller for China Unicom MPLS L3VPN Service

Agile VPN for Carrier/SP Network. ONOS- based SDN Controller for China Unicom MPLS L3VPN Service Agile VPN for Carrier/SP Network ONOS- based SDN Controller for China Unicom MPLS L3VPN Service Introduction In order to meet strong service demand on their network and respond to the new competition (who

More information

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 saikat@cs.cornell.edu Yutaka Takeda Panasonic Communications San Diego,

More information

Secure synthesis and activation of protocol translation agents

Secure synthesis and activation of protocol translation agents Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

Getting Real with Policies for Software Defined Infrastructure. Manish Dave Principal Engineer, Intel IT

Getting Real with Policies for Software Defined Infrastructure. Manish Dave Principal Engineer, Intel IT Getting Real with Policies for Software Defined Infrastructure Manish Dave Principal Engineer, Intel IT Manish Dave, Principal Engineer, Intel IT Network Security Architect @ Intel IT 15+ years of experience

More information

17609: Continuous Data Protection Transforms the Game

17609: Continuous Data Protection Transforms the Game 17609: Continuous Data Protection Transforms the Game Wednesday, August 12, 2015: 8:30 AM-9:30 AM Southern Hemishere 5 (Walt Disney World Dolhin) Tony Negro - EMC Rebecca Levesque 21 st Century Software

More information

Cloud, SDN and the Evolution of

Cloud, SDN and the Evolution of Cloud, SDN and the Evolution of Enterprise Networks Neil Rickard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form

More information

Software Model Checking: Theory and Practice

Software Model Checking: Theory and Practice Software Model Checking: Theory and Practice Lecture: Secification Checking - Temoral Logic Coyright 2004, Matt Dwyer, John Hatcliff, and Robby. The syllabus and all lectures for this course are coyrighted

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

WhiteWave's Integrated Managed File Transfer (MFT)

WhiteWave's Integrated Managed File Transfer (MFT) WhiteWave's Integrated Managed File Transfer (MFT) Spotlight on webmethods ActiveTransfer Scott Jaynes ecommerce Architect, WhiteWave Foods Ramesh Venkat Director, Product Management, Software AG 10/17/12

More information

LuaFlow, an open source Openflow Controller

LuaFlow, an open source Openflow Controller Worksho 2012 LuaFlow, an oen source Oenflow Controller Rahael Amorim rahael@atlantico.com.br rahael.leite@h.com Renato Aguiar aguiar_renato@atlantico.com.br Talk Overview What is OenFlow? How OenFlow Works

More information

Migration to Object Oriented Platforms: A State Transformation Approach

Migration to Object Oriented Platforms: A State Transformation Approach Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,

More information

DevOps and Container Security

DevOps and Container Security DevOs and Container Security Mike Bartock IT Secialist NIST Paul Cichonski Cloud Architect Lanco John Morello Chief Technology Officer Twistlock Raghu Yeluri Princial Engineer Intel Certain commercial

More information

SDN Practices in China Mobile. Lu Huang huanglu@chinamobile.com

SDN Practices in China Mobile. Lu Huang huanglu@chinamobile.com SDN Practices in China Mobile Lu Huang huanglu@chinamobile.com SDN : Bandwidth improvement, Virtualization, Service-chaining 1.Average utility is lower than 50%, but partial links are congested 2.Tenant

More information

with VMware vsphere 5.1 (ESXi)

with VMware vsphere 5.1 (ESXi) Scaling XenDeskto 7 to 5,000 users with VMware vshere 5.1 (ESXi) Citrix Solutions Lab Validated Solutions Design Guide 2 Table of contents Contents Citrix XenDeskto 7 6 Executive Summary 7 Project overview

More information

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari

More information

SMALL BUSINESS GRANTS PROGRAM GUIDELINES

SMALL BUSINESS GRANTS PROGRAM GUIDELINES SMALL BUSINESS GRANTS PROGRAM GUIDELINES S GARTON STREET Small Business Grants Program Suorting our community The City of Melbourne offers a wide range of grants and sonsorshi oortunities to suort the

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Achieving Disaster Recovery Success

Achieving Disaster Recovery Success Achieving Disaster Recovery Success Ros Schulman Hitachi Data Systems Technical Track, Session March, 0 :-:m About the Seakers Ros Schulman is Director, Data Protection at Hitachi Data Systems with over

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

Zero Touch Network- as- a- Service: Agile, Assured and Orchestrated with NFV

Zero Touch Network- as- a- Service: Agile, Assured and Orchestrated with NFV Zero Touch Network- as- a- Service: Agile, Assured and Orchestrated with NFV 1 Catalyst Demo ObjecDves 1. Address market demand for on- demand, assured, cloud- centric network services 2. Bridge gap(s)

More information

Prof. Dr.- Ing. Firoz Kaderali Dipl.-Ing. Alex Essoh

Prof. Dr.- Ing. Firoz Kaderali Dipl.-Ing. Alex Essoh Intrusion Detection - Introduction and Outline Prof. Dr.- Ing. Firoz Kaderali Dil.-Ing. Alex Essoh Talk Outline Motivation Intrusions Intrusion Prevention Intrusion Detection Major Intrusion Detection

More information

Cloud Managed Security with Meraki MX

Cloud Managed Security with Meraki MX Cloud Managed Security with Meraki MX Joe Aronow Product Specialist, Meraki MX #clmel Agenda Introduction: Cloud networking Demo IWAN Product Families Q&A Cisco Meraki: who we are and what we do? Complete

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

NEC contribution to OpenDaylight: Virtual Tenant Network (VTN)

NEC contribution to OpenDaylight: Virtual Tenant Network (VTN) NEC contribution to OpenDaylight: Virtual Tenant Network (VTN) June. 2013 NEC Page 1 Agenda OpenDaylight Virtual Tenant Network - VTN Model Live Demo VTN Implementation Page 2 OpenDaylight Virtual Tenant

More information

Visualization, Management, and Control for Cisco IWAN

Visualization, Management, and Control for Cisco IWAN Visualization, Management, and Control for Cisco IWAN Overview Cisco Intelligent WAN (IWAN) delivers an uncompromised user experience over any connection, whether that connection is Multiprotocol Label

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

C-Bus Voltage Calculation

C-Bus Voltage Calculation D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers

More information

New Virtual Application Networks Innovations Advance Software-defined Network Leadership

New Virtual Application Networks Innovations Advance Software-defined Network Leadership New Virtual Application Networks Innovations Advance Software-defined Network Leadership Simplifying, Scaling and Automating the Network Gartner Hype Cycle 10 Year Cycle 2008 2011 2012 2 Source: Gartner

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Parlay VoXip Voice over IP Gateway ISDN /VoIP (SIP) conversion + advanced call routing features. Unique Voice over IP Gateway / ISDN to SIP converter

Parlay VoXip Voice over IP Gateway ISDN /VoIP (SIP) conversion + advanced call routing features. Unique Voice over IP Gateway / ISDN to SIP converter arlay Voice over I Gateway /VoI (SI) conversion + advanced call routing features arlay Unique Voice over I Gateway / to SI converter Migration to VoI, using equipment without modification Call routing

More information

A Certification Authority for Elliptic Curve X.509v3 Certificates

A Certification Authority for Elliptic Curve X.509v3 Certificates A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena

More information

Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents

Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents Luís Paulo Reis, Nuno Lau 2 and Eugénio Costa Oliveira LIACC Artificial Intelligence and Comuter Science Lab., University

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

IMS INTEGRATED MANAGED SERVICES MONITORING, MAINTENANCE, MANAGEMENT. Epoch Universal

IMS INTEGRATED MANAGED SERVICES MONITORING, MAINTENANCE, MANAGEMENT. Epoch Universal MONITORING, MAINTENANCE, MANAGEMENT HQ: 1 Technology Dr. C511, Irvine, CA 92618 NC: 6331 Carmel Rd. Bldg B CharloHe, NC 28226 SC: 1320 Main St Suite 300 Columbia, SC 29201 Support: support@epochuniversal.com

More information

Free Software Development. 2. Chemical Database Management

Free Software Development. 2. Chemical Database Management Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN

More information

How to Build Successful DSL s. Jos Warmer Leendert Versluijs

How to Build Successful DSL s. Jos Warmer Leendert Versluijs How to Build Successful DSL s Jos Warmer Leendert Versluijs Jos Warmer Expert in Model Driven Development One of the authors of the UML standard Author of books Praktisch UML MDA Explained Object Constraint

More information

Why FOUNDATION Fieldbus?

Why FOUNDATION Fieldbus? Product Bulletin PB 244-R3 Fieldbus Cables Fieldbus Tye A cables rovide installation flexibility in many different environments, including outdoors and where multile or extended cable runs are required.

More information

CANADIAN WATER SECURITY ASSESSMENT FRAMEWORK: TOOLS FOR ASSESSING WATER SECURITY AND IMPROVING WATERSHED GOVERNANCE

CANADIAN WATER SECURITY ASSESSMENT FRAMEWORK: TOOLS FOR ASSESSING WATER SECURITY AND IMPROVING WATERSHED GOVERNANCE CANADIAN WATER SECURITY ASSESSMENT FRAMEWORK: TOOLS FOR ASSESSING WATER SECURITY AND IMPROVING WATERSHED GOVERNANCE KAREN BAKKER, DEPARTMENT OF GEOGRAPHY, UNIVERSITY OF BRITISH COLUMBIA DIANA ALLEN, DEPARTMENT

More information

STILL LOST IN TRANSLATION. City Agencies Compliance with Local Law 73 and Executive Order 120: Examining Progress and Work Still to be Done

STILL LOST IN TRANSLATION. City Agencies Compliance with Local Law 73 and Executive Order 120: Examining Progress and Work Still to be Done STILL LOST IN TRANSLATION City Agencies Comliance with Local Law 73 and Executive Order 12: Examining Progress and Work Still to be Done Reort by: Make the Road New York & the New York Immigration Coalition

More information

Adapting Scientific Workflows on Networked Clouds Using Proactive Introspection

Adapting Scientific Workflows on Networked Clouds Using Proactive Introspection dating Scientific Workflows on Networked Clouds Using Proactive Introsection RENCI Technical Reort www.renci.org dating Scientific Workflows on Networked Clouds Using Proactive Introsection nirban Mandal,

More information

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.

More information

SDN FOR IP/OPTICAL TRANSPORT NETWORKS

SDN FOR IP/OPTICAL TRANSPORT NETWORKS SDN FOR IP/OPTICAL TRANSPORT NETWORKS Tony Kourlas IP Routing and Transport Group, Alcatel-Lucent April 2014 THE EVOLUTION OF IP & OPTICAL NETWORKS Cloud-optimized IP routing & transport IP routing networks

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

White Paper: Virtual Leased Line

White Paper: Virtual Leased Line Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

Virtual CPE and Software Defined Networking

Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative

More information

Strategies for Capturing

Strategies for Capturing Strategies for Capturing Next Wave of Telco Opportunities Chia Tan chiatan@cisco.com Director of SP Engineering Asia Pacific Japan, Cisco Systems AGENDA 1. ICT s 3 rd Platform creates a Hyper-disruptive

More information

Application Defined E2E Security for Network Slices. Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica.

Application Defined E2E Security for Network Slices. Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica. Application Defined E2E Security for Network Slices Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica.com ) Into the Inter-connected World Internet Mobile Internet Internet of

More information

Dynamic Service Chaining for NFV/SDN

Dynamic Service Chaining for NFV/SDN Dynamic Service Chaining for NFV/SDN Kishore Inampudi A10 Networks, Inc. Agenda Introduction NFV Reference Architecture NFV Use cases Policy Enforcement in NFV/SDN Challenges in NFV environments Policy

More information

Business Development Services and Small Business Growth in Bangladesh

Business Development Services and Small Business Growth in Bangladesh Universal Journal of Industrial and Business Management 1(2): 54-61, 2013 DOI: 10.13189/ujibm.2013.010206 htt://www.hrub.org Business Develoment Services and Small Business Growth in Bangladesh Md. Serazul

More information

Preparing your Business for Virtualization. Mirko Voltolini VP Network Technology mirko.voltolini@colt.net

Preparing your Business for Virtualization. Mirko Voltolini VP Network Technology mirko.voltolini@colt.net Preparing your Business for Virtualization Mirko Voltolini VP Network Technology mirko.voltolini@colt.net SDN and NFV are transforming networks The virtualisation of IT has transformed the consumption

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA

Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA Technology shifts center on applications Advanced threats APIs Internet of things Mobility SDDC/Cloud

More information

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs. Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service

More information

Cisco NFV Solution for the Cisco Evolved Services Platform

Cisco NFV Solution for the Cisco Evolved Services Platform Cisco NFV Solution for the Cisco Evolved Services Platform Cisco Knowledge Network Presentation Vijay Venugopal Senior Manager, Product Marketing, Cisco Cloud and Virtualization Group September 2014 Agenda

More information

Masters Project Proxy SG

Masters Project Proxy SG Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the

More information

NFV and SDN Answer or Question?

NFV and SDN Answer or Question? NFV and SDN Answer or Question? Barry Graham Senior Program Director - Agile 2015 TM Forum 1 TM Forum: A Brief Introduction TM Forum is a non-profit global industry association which brings together the

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015 Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?

More information

A highly-underactuated robotic hand with force and joint angle sensors

A highly-underactuated robotic hand with force and joint angle sensors A highly-underactuated robotic hand with force and joint angle sensors Long Wang*, Joseh DelPreto**, Sam Bhattacharyya*, Jonathan Weisz***, Peter K. Allen*** *Mechanical Engineering, **Electrical Engineering,

More information

Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011

Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011 Network Virtualization for the Enterprise Data Center Guido Appenzeller Open Networking Summit October 2011 THE ENTERPRISE DATA CENTER! Major Trends change Enterprise Data Center Networking Trends in the

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

ONF Organization 2015/6/9. Outline. Outline

ONF Organization 2015/6/9. Outline. Outline 2015 Sring:Future Internet Class 2015.6.9 for Future Internet: art 2 Jun Bi Tsinghua University Outline The Driving Force for Transforming the Network rchitecture Considering the "Genes" of the Success

More information

Microsoft Exchange 2013 Citrix NetScaler Deployment Guide

Microsoft Exchange 2013 Citrix NetScaler Deployment Guide Microsoft Exchange 2013 Citrix NetScaler 2 Table of contents What s new in Microsoft Exchange 2013 3 Exchange 2013 Architecture 3 Load Balancing Exchange 2013 5 Lync and SharePoint integration 6 Mobility

More information

day 1 2 Windows Azure Platform Overview... 2 Windows Azure Compute... 3 Windows Azure Storage... 3 day 2 5

day 1 2 Windows Azure Platform Overview... 2 Windows Azure Compute... 3 Windows Azure Storage... 3 day 2 5 Developers Workshop presented by MVP & v-tsp Damir Dobrić Chief Architect and Managing Developer daenet GmbH, Frankfurt / Main day 1 2 Windows Azure Platform Overview... 2 Windows Azure Compute... 3 Windows

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

Transport SDN Toolkit: Framework and APIs. John McDonough OIF Vice President NEC BTE 2015

Transport SDN Toolkit: Framework and APIs. John McDonough OIF Vice President NEC BTE 2015 Transport SDN Toolkit: Framework and APIs John McDonough OIF Vice President NEC BTE 2015 Transport SDN Toolkit Providing carriers with essential tools in the Transport SDN toolkit How to apply SDN to a

More information

construction eal estate health onstruction hospitality energyy healthcare infra PRACTICE AREAS IMPARTIAL. THOROUGH. EXPERIENCED.

construction eal estate health onstruction hospitality energyy healthcare infra PRACTICE AREAS IMPARTIAL. THOROUGH. EXPERIENCED. PRACTICE AREAS Real Estate. INTECH s early days in Risk Management were centred around suorting the Real Estate industry. Since then, we have continued to build our team of exerts, knowledge and techniques

More information

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014 Simplify IT With Cisco Application Centric Infrastructure Barry Huang bhuang@cisco.com Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow

More information

CUBIC AND QUARTIC FORMULAS. James T. Smith San Francisco State University

CUBIC AND QUARTIC FORMULAS. James T. Smith San Francisco State University CUBIC AND QUARTIC FORMULAS James T. Smith San Francisco State University Quadratic formula You ve met the uadratic formula in algebra courses: the solution of the uadratic euation ax + bx + c = 0 with

More information

Reducing Outages and Degradations. With Proactive Application Performance Monitoring. Ted Wilson VP Business Development SL Corporation ted@sl.

Reducing Outages and Degradations. With Proactive Application Performance Monitoring. Ted Wilson VP Business Development SL Corporation ted@sl. Reducing Outages and Degradations With Proactive Application Performance Monitoring Ted Wilson VP Business Development SL Corporation ted@sl.com Agenda Application Performance Monitoring What s All the

More information

Transport SDN Directions. March 20, 2013 Lyndon Ong Ciena lyong@ciena.com

Transport SDN Directions. March 20, 2013 Lyndon Ong Ciena lyong@ciena.com Transport SDN Directions March 20, 2013 Lyndon Ong Ciena lyong@ciena.com SDN Potential Benefits of Transport SDN SDN Benefit Transport Network Impact Network Utilization Application-aware optimization

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

Using LISP for Secure Hybrid Cloud Extension

Using LISP for Secure Hybrid Cloud Extension Using LISP for Secure Hybrid Cloud Extension draft-freitasbellagamba-lisp-hybrid-cloud-use-case-00 Santiago Freitas Patrice Bellagamba Yves Hertoghs IETF 89, London, UK A New Use Case for LISP It s a use

More information